Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
34b5a5e26c1fc9cb86f772e8984ef966_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
34b5a5e26c1fc9cb86f772e8984ef966_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
34b5a5e26c1fc9cb86f772e8984ef966
-
SHA1
04c065da296af65d4d6217a984494239127ca651
-
SHA256
3e6d8d1cbcc0301f55df11d1ed8889cd73920d683488f95bfaaef68cc795e2fe
-
SHA512
b8ee5e509d1091a99b2f2b8523b3203f236d2ccc68a3be13b297018ab17c9c53bfc12b19888d096a15ce4dd6812a8177180d94c4b16bd71cc0320e918b37edaf
-
SSDEEP
24576:GuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Nxt:m9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3456-4-0x0000000002480000-0x0000000002481000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
raserver.exeRdpSaUacHelper.exeRdpSaUacHelper.exepid Process 5104 raserver.exe 5004 RdpSaUacHelper.exe 536 RdpSaUacHelper.exe -
Loads dropped DLL 3 IoCs
Processes:
raserver.exeRdpSaUacHelper.exeRdpSaUacHelper.exepid Process 5104 raserver.exe 5004 RdpSaUacHelper.exe 536 RdpSaUacHelper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3774859476-2260090144-3466365324-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lkmfajh = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\SSr3E\\RdpSaUacHelper.exe" -
Processes:
RdpSaUacHelper.exeRdpSaUacHelper.exerundll32.exeraserver.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSaUacHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSaUacHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 4064 rundll32.exe 4064 rundll32.exe 4064 rundll32.exe 4064 rundll32.exe 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 3456 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3456 wrote to memory of 4952 3456 84 PID 3456 wrote to memory of 4952 3456 84 PID 3456 wrote to memory of 5104 3456 85 PID 3456 wrote to memory of 5104 3456 85 PID 3456 wrote to memory of 3268 3456 86 PID 3456 wrote to memory of 3268 3456 86 PID 3456 wrote to memory of 5004 3456 87 PID 3456 wrote to memory of 5004 3456 87 PID 3456 wrote to memory of 3956 3456 88 PID 3456 wrote to memory of 3956 3456 88 PID 3456 wrote to memory of 536 3456 89 PID 3456 wrote to memory of 536 3456 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34b5a5e26c1fc9cb86f772e8984ef966_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:4952
-
C:\Users\Admin\AppData\Local\lyhBikp\raserver.exeC:\Users\Admin\AppData\Local\lyhBikp\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5104
-
C:\Windows\system32\RdpSaUacHelper.exeC:\Windows\system32\RdpSaUacHelper.exe1⤵PID:3268
-
C:\Users\Admin\AppData\Local\ga5J9\RdpSaUacHelper.exeC:\Users\Admin\AppData\Local\ga5J9\RdpSaUacHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5004
-
C:\Windows\system32\RdpSaUacHelper.exeC:\Windows\system32\RdpSaUacHelper.exe1⤵PID:3956
-
C:\Users\Admin\AppData\Local\e0bFRdpqT\RdpSaUacHelper.exeC:\Users\Admin\AppData\Local\e0bFRdpqT\RdpSaUacHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56b59e828ea6d3a6ecbcb63f9bdaa1a77
SHA10fc3e9b01436813260643a96f152c8f2bf661443
SHA2567af7b5784209061724cffef65a6871c354c38840f999d70aed4baeff9abf0c73
SHA5129a7cd4ad831dc79eefff89c5b8fb54a35e4ac758747decd4ee4cff610f61c8f0a45636a19b23d85180927fff3a691946780abf3f4166987efaad1862dd56cf9b
-
Filesize
33KB
MD50d5b016ac7e7b6257c069e8bb40845de
SHA15282f30e90cbd1be8da95b73bc1b6a7d041e43c2
SHA2566a6fdd834af9c79c5ffc5e6b51700030259aeae535f8626df84b07b7d2cee067
SHA512cd44d8b70fc67c692e6966b4ad86a7de9c96df0bade1b3a80cb4767be159d64f3cc04dc5934f7d843b15101865089e43b8aecabddc370b22caf0c48b56b3430e
-
Filesize
1.2MB
MD5ec558af5bba9df3fcdaa96ae6644b204
SHA1a159996259f7ab7bd8a6bf47b79a0ccbbacc497a
SHA2568658ae7db053e84fb731487d532a5049675a14789e7abaf7dc97165534316ece
SHA5129cc5b70845d2c34632f9e36430b95a401eda1873da3d51b0cb0f9186cd455e9357b7db05538c40ecfb9c98d4a2875be63174cefe18d246064efc13c6c41d11b3
-
Filesize
1.2MB
MD5e6edd2ff33b8745f0c4b057bf9b1cf0a
SHA18f21cb7419c315653ce05bd3e1e2dfc91d5e73d5
SHA256389e14f1e783db8eb267a5b5a5aed01b142fadfdd566a76e9cacff710a36545c
SHA512f8117e6d2aebf7bb4abd47946b17e325b0018a929bd1e0c22530caaf53e57fc6aac31294caf14598b4d224ba5683c904991cc87a9e126cde5705077adc846384
-
Filesize
132KB
MD5d1841c6ee4ea45794ced131d4b68b60e
SHA14be6d2116060d7c723ac2d0b5504efe23198ea01
SHA25638732626242988cc5b8f97fe8d3b030d483046ef66ea90d7ea3607f1adc0600d
SHA512d8bad215872c5956c6e8acac1cd3ad19b85f72b224b068fb71cfd1493705bc7d3390853ba923a1aa461140294f8793247df018484a378e4f026c2a12cb3fa5c9
-
Filesize
1KB
MD573dd1de4624d5249b9d4e527270e2eb8
SHA1ce2fa4c892e07e3d6e0319fdeb25987533147db8
SHA256582b6f1303fc6428b94d0c270dcecb78b1ae7d0ce8066dd0f800ea6bae1091d6
SHA5128a244c6f35e8add094072091bf38b88085da8d36ce4b2e658db0475d7b3d26bd53ea34f900fd3e1e3f414f1cc31b87e784fe81372276898c54518febdee27c2a